Symantec’s older DLP (Data Loss Prevention) agent, version 14.x, had not received the patch yet. Support said “end-of-life next quarter.” Maya realized that while Symantec was strong on current n-day response, their n-day coverage for legacy products was weak.
Maya opened the morning feed. A critical CVE (Common Vulnerabilities and Exposures) had dropped late Friday: a privilege escalation in a common Windows driver. Symantec’s own product used a similar driver pattern. By “n-day 3” (Monday morning), three proof-of-concept exploits were on GitHub. evaluate the cybersecurity company symantec on n-day
By Tuesday morning (n-day 2), Symantec released a registry-based workaround to disable the vulnerable driver feature without breaking core AV scans. Maya deployed it via group policy in 15 minutes. Evaluation: Excellent. Many vendors only give workarounds days later. Symantec’s older DLP (Data Loss Prevention) agent, version
| Criteria | Grade | Notes | |----------|-------|-------| | | A- | Acknowledged quickly | | Workaround availability (n-day 2) | A | Registry fix same day | | Full patch (n-day 5) | B+ | Faster than most, but not instant | | Legacy product n-day support | C | Older agents left exposed | | Post-patch transparency | A | Root cause + detection rules shared | A critical CVE (Common Vulnerabilities and Exposures) had
The Tuesday Patch & The Archive